Risk-Based Cybersecurity Compliance Assessment System (RC2AS)

被引:4
|
作者
Alfaadhel, Afnan [1 ]
Almomani, Iman [1 ,2 ]
Ahmed, Mohanned [1 ]
机构
[1] Prince Sultan Univ, Comp Sci Dept, Secur Engn Lab, Riyadh 11586, Saudi Arabia
[2] Univ Jordan, King Abdullah Sch Informat Technol, Comp Sci Dept, Amman 11942, Jordan
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 10期
关键词
compliance assessment; maturity model; cybersecurity; risk; ECC; Saudi Arabia;
D O I
10.3390/app13106145
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Cybersecurity attacks are still causing significant threats to individuals and organizations, affecting almost all aspects of life. Therefore, many countries worldwide try to overcome this by introducing and applying cybersecurity regularity frameworks to maintain organizations' information and digital resources. Saudi Arabia has taken practical steps in this direction by developing the essential cybersecurity control (ECC) as a national cybersecurity regulation reference. Generally, the compliance assessment processes of different international cybersecurity standards and controls (ISO2700x, PCI, and NIST) are generic for all organizations with different scopes, business functionality, and criticality level, where the overall compliance score is absent with no consideration of the security control risk. Therefore, to address all of these shortcomings, this research takes the ECC as a baseline to build a comprehensive and customized risk-based cybersecurity compliance assessment system (RC2AS). ECC has been chosen because it is well-defined and inspired by many international standards. Another motive for this choice is the limited related works that have deeply studied ECC. RC2AS is developed to be compatible with the current ECC tool. It offers an offline self-assessment tool that helps the organization expedite the assessment process, identify current weaknesses, and provide better planning to enhance its level based on its priorities. Additionally, RC2AS proposes four methods to calculate the overall compliance score with ECC. Several scenarios are conducted to assess these methods and compare their performance. The goal is to reflect the accurate compliance score of an organization while considering its domain, needs, resources, and risk level of its security controls. Finally, the outputs of the assessment process are displayed through rich dashboards that comprehensively present the organization's cybersecurity maturity and suggest an improvement plan for its level of compliance.
引用
收藏
页数:31
相关论文
共 50 条
  • [41] Risk-Based Optimization of Bracing Systems for Seismic Retrofitting of RC Buildings
    Laguardia, R.
    Franchin, P.
    JOURNAL OF STRUCTURAL ENGINEERING, 2022, 148 (06)
  • [42] Risk-based efficiency assessment of information systems
    Isaev, Eugeni A.
    Pervukhin, Dmitry, V
    Rytikov, Georgy O.
    Filyugina, Ekaterina K.
    Hayrapetyan, Diana A.
    BIZNES INFORMATIKA-BUSINESS INFORMATICS, 2021, 15 (01): : 19 - 29
  • [43] RISK-BASED STABILITY ASSESSMENT OF A GANTRY CRANE
    Xu, Bin
    Yu, Zhongjian
    Yang, Yuqing
    Tang, Xiaoying
    Zhang, Tao
    PROCEEDINGS OF THE ASME 12TH BIENNIAL CONFERENCE ON ENGINEERING SYSTEMS DESIGN AND ANALYSIS - 2014, VOL 3, 2014,
  • [44] Risk-Based Assessment of Animal Facility Operations
    Krusas, R. W.
    JOURNAL OF THE AMERICAN ASSOCIATION FOR LABORATORY ANIMAL SCIENCE, 2009, 48 (05): : 535 - 536
  • [45] Rotating equipment risk-based assessment and benchmarking
    Drosjack, MJ
    Tanner, GM
    HYDROCARBON PROCESSING, 2001, 80 (01): : 38 - +
  • [46] FDA to use risk-based plant assessment
    不详
    TCE, 2004, (761): : 11 - 11
  • [47] Moving from compliance-based security to a risk-based security model
    Comput. Fraud Secur., 2009, 9 (14-17):
  • [48] Optimizing business processes compliance using an evolvable risk-based approach
    Guerreiro, Sergio
    Marques, Rui Pedro
    Gaaloul, Khaled
    PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016), 2016, : 5652 - 5661
  • [49] Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN
    Budhraja, Karan K.
    Malvankar, Abhishek
    Bahrami, Mehdi
    Kundu, Chinmay
    Kundu, Ashish
    Singhal, Mukesh
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 761 - 765
  • [50] Risk assessment and risk-based therapeutic strategies in febrile neutropenia
    Kern, WV
    CURRENT OPINION IN INFECTIOUS DISEASES, 2001, 14 (04) : 415 - 422